MITIGATION OF COMPUTER NETWORK ATTACKS
Various techniques for mitigating computer network attacks are disclosed herein. In one embodiment, a method includes receiving indications of denial of service attacks from multiple target computing systems and determining one or more sources from which the denial of service attacks are deemed to originate in response to the received indications of denial of service attacks from the target computing systems. The method also includes negotiating with the network aggregation point for permission to divert network traffic originated from the one or more of the determined sources and destined to the target computing systems to the gateway.
In computing, a denial-of-service (“DoS”) attack is an attempt to render computing devices or network resources unavailable to intended users by overloading them with a large number of service requests. For example, a DoS attack may utilize a group of computers at different locations to submit a large number of service requests to a web server in order to deplete computing, communications, storage, or other types of resources associated with the web server. As a result of a DoS attack, the web server may not timely, or at all, respond to legitimate requests for services. For many organizations, not timely responding to legitimate requests can cause significant loss in revenue or harm to customer goodwill.
SUMMARYThis Summary is provided to introduce a selection of concepts in a simplified form that are further described below in the Detailed Description. This Summary is not intended to identify key features or essential features of the claimed subject matter, nor is it intended to be used to limit the scope of the claimed subject matter.
Several embodiments of the disclosed technology are directed to mitigation of denial of service (“DoS”), distributed DoS (DDoS), or other suitable types of computer network attacks. In one aspect, one or more mitigation gateways can be co-located proximate to internet service provider (“ISP”) gateways, internet exchange point (“IXP”) gateways, and/or other suitable types of network aggregation point gateways. In operation, one or more computing systems can detect attacks on at least a portion of the computing network and communicate information regarding the attacks to the mitigation gateways. The mitigation gateways can aggregate such information from multiple computing systems to determine source IP addresses and/or other suitable characteristics of network traffic related to the detected attacks. The mitigation gateways can then negotiate with corresponding network aggregation point gateways to divert at least a portion of the network traffic with the determined characteristics to the mitigation gateways. Upon receiving the diverted network traffic, the mitigation gateways can block, filter, reroute, and/or apply other suitable mitigation techniques to the diverted network traffic.
In another aspect, the mitigation gateways can also be configured to monitor for abnormal network traffic through corresponding network aggregation point gateways based on a set of traffic rules. The traffic rules can be based on machine learning of normal traffic patterns, configuration input from one or more computing networks, and/or other suitable sources. In response to detecting abnormal network traffic, the mitigation gateways can contact one or more computing systems that are the destinations for the detected abnormal network traffic. Upon confirmation from the computing systems that the detected abnormal network traffic is likely malicious, the mitigation gateways can negotiate with the corresponding network aggregation point gateways to divert at least some of the network traffic destined to the computing systems. The mitigation gateways can then apply various mitigation techniques to the diverted network traffic to mitigate or even prevent DoS, DDoS, or other suitable types of attacks on the computing systems.
In another aspect, a mitigation gateway can be configured to negotiate with other systems. For example, a mitigation gateway can receive a traffic control request that includes source, destination, and control commands (e.g., allow, deny commands). The mitigation gateway can negotiate for the ability to implement the commands by requesting permission to a control system. The control system may deny the request, allow some of the request, or allow all of the request to be implemented. The control system may respond with permissions. The control system may be owned and implemented by an ISP, be part of an IXP, be owned by another entity than the owner of the mitigation gateway, or be owned by the same entity. Regardless, the mitigation gateway has the ability to negotiate with systems across organizational boundaries for mitigation strategies.
A mitigation gateway with an ability to dynamically negotiate for traffic routing with other entities has various technical advantages. If a mitigation gateway does not negotiate for permission to route traffic, an ISP may not allow the mitigation gateway to be installed at all. Without a mitigation gateway in place, the security and performance of the network protected by the mitigation gateway is compromised. By negotiating with an ISP, or other host location network, the mitigation gateway can enhance security of the host location network by controlling permitted changes in data traffic. Still further, the host location network may permit or deny routing actions based on the impact on performance of the mitigation strategies requested. Thus, performance and efficiency of the host location network and/or the computing systems (e.g., datacenters) being protected by a mitigation gateway can be improved.
Certain embodiments of systems, devices, components, modules, routines, and processes for mitigating computer network attacks are described below. In the following description, specific details of components are included to provide a thorough understanding of certain embodiments of the disclosed technology. A person skilled in the relevant art will also understand that the disclosed technology may have additional embodiments or may be practiced without several of the details of the embodiments described below with reference to
As used herein, the term “computer network attack” or “attack” generally refers to operations to disrupt, deny, degrade, or destroy information in, data streams to/from, or services provided by computers, computing systems, or computer networks. Example computer network attacks can include denial of service (“DoS”), distributed DoS (“DDoS”), data modification, identity spoofing, sniffer, or application-layer attacks. A DoS or DDoS attack is an attempt to render computers, computing systems, or computer network resources unavailable to intended users via overloading with service requests or other types of requests. Even though embodiments of the disclosed technology are described as being configured to mitigation DoS or DDoS attacks, aspects of the disclosed technology may also be applied to mitigate other suitable types of computer network attacks.
Also used herein, the term “aggregation point” generally refers to a gateway, router, switch, or other suitable types of network component in a computer network that is configured to combine network traffic from multiple sources. In one example, an aggregation point can be an Internet service provider (“ISP”) gateway configured to combine network connections from multiple subscribers or users. In another example, an aggregation point can also include an Internet exchange point (“IXP”) gateway through which ISPs, content delivery networks (“CDNs”), or other suitable types of computer networks (referred to as autonomous systems) exchange Internet traffic with one another.
The term “network traffic” generally refers to data streams flowing through network connections of a computer network via, for example, one or more of ISP, CDN, or IXP gateways. Network traffic can include data streams representing service requests, media data, user data, or other suitable types of data. For example, network traffic can include multiple service requests to a web server for content. Network traffic can be organized as packets, bit streams, or other suitable units. Network connections are logical and/or physical channels configured to carry network traffic.
The computer network 112 can include the Internet, a local area network, a metropolitan area network, a wide area network, and/or other suitable types of network. As shown in
The computing systems 102 can include any suitable types of networked computing systems. For example, in one embodiment, the first computing system 102a can include an enterprise computing system associated with a corporation. The second computing system 102b can include a datacenter provided by the corporation. In other embodiments, the computing systems 102 can each include a web service system, a media content delivery system, an online gaming system, or other suitable types of systems.
As shown in
The remote network 104 can include a local aggregation point 108 configured to aggregate network traffic from multiple client devices 110. The client devices 110 can each include a desktop, a laptop, a tablet, a smartphone, and/or other suitable types of computing device. Though only two client devices 110 are shown in
In certain embodiments, the remote network 104 can be associated with a particular geographic location distant from locations of the computing systems 102. For example, the remote network 104 can physically reside in, for instance, China, Russia, or Ukraine, while the computing systems 102 are located in the United States. In other embodiments, the remote network 104 can be associated with service providers (e.g., Amazon Web Service) that are physically located in the same geographic area as the computing systems 102 but in distinct autonomous systems.
As shown in
In certain embodiments, the mitigation gateway 106 can be physically co-located with the local aggregation point 108. In other embodiments, the mitigation gateway 106 can be located in a different physical location as the remote network 104 but operatively coupled to the local aggregation point 108 via the computer network 112. In further embodiments, the mitigation gateway 106 can be located and operatively coupled to the network aggregation point 114 instead of the local aggregation point 108, as described in more detail below with reference to
In operation, the local aggregation point 108 can receive network traffic from the client devices 110. In
In response to receiving the traffic information 122, the mitigation gateway 106 can aggregate the received traffic information 122 from the detection devices 103a and 103b. In one example, the mitigation gateway 106 can determine if one or more of the IP addresses (or other suitable device identification) reported in the traffic information 122 are associated with the client devices 110 in the remote network 104. If the determination is positive, the mitigation gateway 106 can compile a list of all IP addresses of the client devices 110 involved in the detected attacks on the computing systems 102a and 102b. In another example, the mitigation gateway 106 can also interrogate the local aggregation point 108 to identify the client devices 110 based on, for instance, MAC addresses, local IP addresses, or other suitable signatures of network traffic involved in the detected attacks. As such, the mitigation gateway 106 can determine IP addresses (or other suitable device identification) of the client devices 110 from which the detected attacks were launched based on the aggregated traffic information 122.
The mitigation gateway 106 can then negotiate with the local aggregation point 108 to divert at least a portion of the network traffic originating from the client device 110 and destined to the computing systems 102 to the mitigation gateway 106. In the illustrated embodiment, the mitigation gateway 106 can transmit a request for permission to divert 124 to the local aggregation point 108 following, for instance, the Agent Communication Language (“ACL”) or other suitable types of communications protocols. In response, the local aggregation point 108 can transmit a permission message 126 to the mitigation gateway 106. The local aggregation point 108 can allow diversion of all, a portion of, or none of the requested network traffic to the mitigation gateway 106.
In response to receiving the permission message 126 allowing diversion of at least a portion of the requested network traffic, in certain embodiments, the mitigation gateway 106 can announce to the local aggregation point 108 one or more preferred Border Gateway Protocol (“BGP”) routes. In response, the local aggregation point 108 can modify routing tables to forward at least a portion of the network traffic to the mitigation gateway 106. In other embodiments, the mitigation gateway 106 can achieve diversion of the requested network traffic in other suitable manners.
In further embodiments, in addition to or in lieu of the diversion technique described above, the mitigation gateway 106 can also signal one or more of the client devices 110 to refrain from transmitting any additional service requests 120 or other types of network traffic to the computing systems 102. For example, the mitigation gateway 106 can transmit a command, a request, or other suitable types of message to the individual client devices 110. The messages can indicate that, for instance, the client devices 110 have been identified as sources of the detected attack and/or no more network traffic to the computing systems 102 to be generated. In response to receiving the messages, an application (e.g., an anti-virus or anti-spam application), a portion of an operating system (e.g., a utility), and/or other suitable components of the individual client devices 110 can reduce or stop sending service request 120 or other types of network traffic to the computing systems 102. In yet further embodiments, the mitigation gateway 106 can also signal one or more routers, switches, and/or other suitable network components in the remote network 104 to refrain from generating additional network traffic to the computing systems 102.
As shown in
In certain embodiments, the mitigation gateway 106 can also monitor network traffic through the local aggregation point 108 for abnormal traffic patterns based on a set of traffic rules 133 (shown in
In certain embodiments, at least some of the traffic rules can be provided based on user input at the computing systems 102. For example, administrators of the computing systems 102 can create a white list containing sources allowed to submit service requests 120 to the computing systems 102. In another example, a black list can also be created to contain, for example, IP addresses from which service requests 120 are not allowed. In a further example, the users or administrators of the computing systems 102 can also designate sources (e.g., tenants of Amazon Web Service) from which service requests 120 are not expected. An example user interface for receiving one or more traffic rules is described in more detail below with reference to
In other embodiments, the mitigation gateway 106 (or other suitable components) can generate the traffic rules based on machine learning of normal traffic patterns associated with the local aggregation point 108. For example, in one embodiment, the mitigation gateway 106 can monitor and record a volume, a volume change, a temporal pattern of volume or volume change, a destination pattern, and/or other suitable characteristics of network traffic associated with one or more of the client devices 110 or destined for the individual computing systems 102. The mitigation gateway 106 can then apply various statistical analysis techniques to the recorded information. For instance, the mitigation gateway 106 can calculate an average, a standard deviation, or other suitable values based on the recorded data. In further embodiments, the traffic rules can also be provided by other suitable entities.
The mitigation gateway 106 can then compare the monitored network traffic patterns with normal traffic patterns to determine whether to raise a network traffic alarm for an abnormal traffic pattern. For instance, the mitigation gateway 106 can determine to raise an alarm under the following example conditions:
-
- An instantaneous or average traffic volume destined to one of the computing systems 102 exceeds a threshold value in the traffic rules by a predetermined margin (e.g., 10%, 20%, or 50%);
- An instantaneous or average traffic volume from one or more of the client devices 110 exceeds a threshold value in the traffic rules by a predetermined margin (e.g., 10%, 20%, or 50%);
- An instantaneous or average traffic volume or volume change at a particular time (e.g., midnight) destined to one of the computing systems 102 exceeds a threshold value in the traffic rules by a predetermined margin (e.g., 10%, 20%, or 50%);
- An instantaneous or average traffic volume or volume change at a particular time (e.g., midnight) from one or more of the client devices 110 exceeds a threshold value in the traffic rules by a predetermined margin (e.g., 10%, 20%, or 50%);
- A spike of traffic volume destined to one of the computing systems 102 that exceeds a threshold value in volume change in the traffic rules by a predetermined margin (e.g., 10%, 20%, or 50%); and
- A spike of traffic volume from one or more of the client devices 110 that exceeds a threshold value in volume change in the traffic rules by a predetermined margin (e.g., 10%, 20%, or 50%).
The foregoing example conditions are listed for illustration purposes only. In other embodiments, the traffic rules can include other suitable conditions associated with other suitable parameters of the network traffic.
Once the mitigation gateway 106 raises an alarm, in certain embodiments, the mitigation gateway 106 can indicate to one or more of the computing systems 102 the alarm and/or the detected abnormal traffic pattern. The mitigation gateway 106 can then receive a response from the one or more computing systems 102. If the response confirms that the detected abnormal traffic pattern is expected due to, for instance, a product release, an upgrade release, etc., the mitigation gateway 106 can mark the raised alarm as a false alarm. If the response confirms that the detected abnormal traffic pattern is not expected, the mitigation gateway 106 can then initiate the request to divert and divert at least a portion of the network traffic associated with the detected abnormal traffic pattern, as discussed above. In other embodiments, the mitigation gateway 106 can initiate the request for permission to divert upon detecting the abnormal traffic pattern without indicating to the computing systems 102 regarding the abnormal traffic pattern.
Several embodiments of the computing framework 100 can efficiently mitigate impact of DoS, DDoS, or other suitable computer network attacks. As described above, the mitigation gateway 106 can process network traffic involved in a detected attack close to the sources of the attack. As such, downstream network components (e.g., the network aggregation point 114) and the computing systems 102 may be unaffected by the detected attacks. Also, the mitigation gateway 106 can also monitor for abnormal traffic patterns of network traffic passing through the local aggregation point 108 and apply mitigation techniques when needed. As a result, response time for detecting potential computer network attacks can be shortened when compared to conventional techniques.
Even though the mitigation gateway 106 is shown in
As shown in
As shown in
The computer program, procedure, or process may be compiled into object, intermediate, or machine code and presented for execution by one or more processors of a personal computer, a network server, a laptop computer, a smartphone, and/or other suitable computing devices. Equally, components may include hardware circuitry. A person of ordinary skill in the art would recognize that hardware can be considered fossilized software, and software can be considered liquefied hardware. As just one example, software instructions in a component can be burned to a Programmable Logic Array circuit, or can be designed as a hardware circuit with appropriate integrated circuits. Equally, hardware can be emulated by software. Various implementations of source, intermediate, and/or object code and associated data may be stored in a computer memory that includes read-only memory, random-access memory, magnetic disk storage media, optical storage media, flash memory devices, and/or other suitable computer readable storage media excluding propagated signals.
As shown in
The processor 130 can execute instructions to provide a plurality of software components 140 configured to facilitate mitigation of DoS, DDoS, or other suitable types of computer network attacks. As shown in
The input component 142 can be configured to receive traffic information 122 from multiple computing systems 102 operatively coupled to the mitigation gateway 106 via the computer network 112 (
The traffic information 122 from the second computing system 102b can include a list of destination IP addresses, corresponding source IP addresses, an associated autonomous system, and an associated action as follows:
In one embodiment, the input component 142 can include a network interface module configured to receive the traffic information 122 as a network message configured according to TCP/IP or other suitable network protocols. In other embodiments, the input component 142 can also include other suitable modules. The input component 142 can then forward the received traffic information 122 to the analysis component 144.
The analysis component 144 can be configured to determine one or more sources from which the computer network attacks have originated based on the received traffic information 122 from the computing systems 102. In one embodiment, the analysis component 144 can aggregate the traffic information 122 and identify occurrences of source IP addresses from the traffic information 122. For instance, in the example above, the source IP addresses “1.2.0.0/16” can be identified as the source for transmitting multiple service requests 120 (
The control component 146 can be configured to transmit a request 124 for permission to the local aggregation point 108 (
If the permission 126 indicates that at least a portion of the requested network traffic is granted, the input component 142 can then be configured to receive the service requests 120 or other suitable types of network traffic from the local aggregation point 108 and/or the network aggregation point 114. The input component 142 can then forward the received network traffic to the mitigation component 148.
The mitigation component 148 can be configured to mitigate the detected computer network attacks on the computing systems 102 by performing various mitigation techniques on the diverted network traffic. For example, in one embodiment, the mitigation component 148 can block the received network traffic from reaching the computing systems 102. In another embodiment, the mitigation component 148 can filter the received network traffic based on, for instance, the identified source IP addresses “1.2.0.0/16.” Network traffic that is not originated form this IP address can then be forwarded to the computing systems 102. In yet another embodiment, the mitigation component 148 can reroute at least a portion of the received network traffic via, for instance, a new network connection than the original network connection. During such reroute, the mitigation component 148 may also apply traffic balancing techniques between the new and original network connections. In further embodiments, the mitigation component 148 can apply a combination of the foregoing and/or other suitable mitigation techniques.
The monitor component 150 can be configured to monitor network traffic through the local aggregation point 108 and/or the network aggregation point 114 for abnormal traffic patterns based on the traffic rules 133. The monitor component 150 can also be configured to indicate an alarm when an abnormal traffic pattern is detected or when a normal traffic pattern is violated. Once the monitor component 150 raises an alarm, in certain embodiments, the monitor component 150 can indicate to one or more of the computing systems 102 the alarm and/or the detected abnormal traffic pattern.
The input component 142 can then receive a response (not shown) from the one or more computing systems 102. If the response confirms that the detected abnormal traffic pattern is expected, the monitor component 150 can clear the raised alarm. If the response confirms that the detected abnormal traffic pattern is not expected, the monitor component 150 can then cause the control module 146 to initiate the request to divert at least a portion of the network traffic associated with the detected abnormal traffic pattern. The mitigation component 148 can then apply the various mitigation techniques to any received diverted network traffic, as described above.
Even though particular components 140 are shown in
As shown in
The process 200 can also include negotiating for diversion of at least a portion of the network traffic at stage 206. The network traffic requested to be diverted is originated from the identified one or more sources and destined to one or more computing systems at which the attack is detected. As described in more detail above with reference to
The process 200 can then include a decision stage 208 to determine if permission is granted to divert at least a portion of the requested network traffic. In response to determining that a permission is not granted by, for example, the local aggregation point 108 or the network aggregation point 114, the process 200 reverts to receiving traffic information at stage 202. In response to determining that a permission is granted to divert at least a portion of the requested network traffic, the process 200 includes causing the local aggregation point 108 or the network aggregation point 114 to divert at least a portion of the requested network traffic and accepting the diverted network traffic at stage 210. In certain embodiments, permission may be granted to divert network traffic from a subset of the determined sources. In other embodiments, permission may be granted to divert certain types (e.g., web traffic) of network traffic from a particular source. In further embodiments, the permission to divert may be granted partially in other suitable manners. The process 200 can further include applying various mitigation techniques on the diverted network traffic, as described above with reference to
As shown in
In response to determining that an alarm is not to be raised, the process 300 reverts to receiving traffic rules at stage 302. In response to determining that an alarm is to be raised, the process 300 proceeds to indicating the alarm to one or more computing systems 102 (
In response to determining that the raised alarm is a false alarm, the process 300 reverts to receiving traffic rules at stage 302. In response to determining that the raised alarm is not a false alarm, the process 300 proceeds to negotiating for diversion of network traffic at stage 206, the decision stage 208, accepting the diverted network traffic at stage 210, and applying various mitigation techniques at stage 212, as described above with reference to
Depending on the desired configuration, the processor 404 may be of any type including but not limited to a microprocessor (μP), a microcontroller (μC), a digital signal processor (DSP), or any combination thereof. The processor 404 may include one more levels of caching, such as a level one cache 410 and a level two cache 412, a processor core 414, and registers 416. An example processor core 414 may include an arithmetic logic unit (ALU), a floating point unit (FPU), a digital signal processing core (DSP Core), or any combination thereof. An example memory controller 418 may also be used with processor 404, or in some implementations memory controller 418 may be an internal part of processor 404.
Depending on the desired configuration, the system memory 406 may be of any type including but not limited to volatile memory (such as RAM), non-volatile memory (such as ROM, flash memory, etc.) or any combination thereof. The system memory 406 can include an operating system 420, one or more applications 422, and program data 424. The program data 424 may include, for example, the traffic rules 133. This described basic configuration 402 is illustrated in
The computing device 400 may have additional features or functionality, and additional interfaces to facilitate communications between basic configuration 402 and any other devices and interfaces. For example, a bus/interface controller 430 may be used to facilitate communications between the basic configuration 402 and one or more data storage devices 432 via a storage interface bus 434. The data storage devices 432 may be removable storage devices 436, non-removable storage devices 438, or a combination thereof. Examples of removable storage and non-removable storage devices include magnetic disk devices such as flexible disk drives and hard-disk drives (HDD), optical disk drives such as compact disk (CD) drives or digital versatile disk (DVD) drives, solid state drives (SSD), and tape drives to name a few. Example computer storage media may include volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information, such as computer readable instructions, data structures, program modules, or other data.
The system memory 406, removable storage devices 436, and non-removable storage devices 438 are examples of computer readable storage media. Computer readable storage media include storage hardware or device(s), examples of which include, but not limited to, RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, digital versatile disks (DVD) or other optical storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other media which may be used to store the desired information and which may be accessed by computing device 400. Any such computer readable storage media may be a part of computing device 400. The term “computer readable storage medium” excludes propagated signals and communication media.
The computing device 400 may also include an interface bus 440 for facilitating communication from various interface devices (e.g., output devices 442, peripheral interfaces 444, and communication devices 446) to the basic configuration 402 via bus/interface controller 430. Example output devices 442 include a graphics processing unit 448 and an audio processing unit 450, which may be configured to communicate to various external devices such as a display or speakers via one or more AN ports 452. Example peripheral interfaces 444 include a serial interface controller 454 or a parallel interface controller 456, which may be configured to communicate with external devices such as input devices (e.g., keyboard, mouse, pen, voice input device, touch input device, etc.) or other peripheral devices (e.g., printer, scanner, etc.) via one or more I/O ports 458. An example communication device 446 includes a network controller 460, which may be arranged to facilitate communications with one or more other computing devices 462 over a network communication link via one or more communication ports 464.
The network communication link may be one example of a communication media. Communication media may typically be embodied by computer readable instructions, data structures, program modules, or other data in a modulated data signal, such as a carrier wave or other transport mechanism, and may include any information delivery media. A “modulated data signal” may be a signal that has one or more of its characteristics set or changed in such a manner as to encode information in the signal. By way of example, and not limitation, communication media may include wired media such as a wired network or direct-wired connection, and wireless media such as acoustic, radio frequency (RF), microwave, infrared (IR) and other wireless media. The term computer readable media as used herein may include both storage media and communication media.
The computing device 400 may be implemented as a portion of a small-form factor portable (or mobile) electronic device such as a cell phone, a personal data assistant (PDA), a personal media player device, a wireless web-watch device, a personal headset device, an application specific device, or a hybrid device that include any of the above functions. The computing device 400 may also be implemented as a personal computer including both laptop computer and non-laptop computer configurations.
Specific embodiments of the technology have been described above for purposes of illustration. However, various modifications may be made without deviating from the foregoing disclosure. In addition, many of the elements of one embodiment may be combined with other embodiments in addition to or in lieu of the elements of the other embodiments. Accordingly, the technology is not limited except as by the appended claims.
Claims
1. A computing device for mitigating computer network attacks, the computing device having a processor and comprising:
- an input component configured to receive traffic information, the traffic information including data representing a source, a destination, and an action;
- a control component configured to negotiate for permission to divert network traffic to the computing device by: sending the data representing the source in the first traffic information; and receiving a permission to divert traffic originating from the source; and
- a mitigation component configured to receive the diverted traffic originating from the source in response to receiving the permission.
2. The computing device of claim 1, further comprising a monitoring component configured to:
- monitor the network traffic for an abnormal traffic pattern based on a traffic rule, the traffic rule specifying tenant of a datacenter from which network traffic is not expected; and
- indicate a network traffic alarm when an abnormal traffic pattern is detected or when a normal traffic pattern is violated.
3. The computing device of claim 1, further comprising a monitoring component configured to:
- monitor the network traffic for an abnormal traffic pattern based on a traffic rule, the traffic rule specifying a condition for an abnormal traffic pattern or a condition for a normal traffic pattern;
- indicate a network traffic alarm when an abnormal traffic pattern is detected or when a normal traffic pattern is violated; and
- wherein the input component is also configured to receive an indication that the network traffic alarm is a false alarm.
4. The computing device of claim 1, further comprising a monitoring component configured to:
- monitor the network traffic for an abnormal traffic pattern based on a traffic rule, the traffic rule specifying a condition for an abnormal traffic pattern or a condition for a normal traffic pattern;
- indicate a network traffic alarm when an abnormal traffic pattern is detected or when a normal traffic pattern is violated;
- wherein the input component is also configured to receive an indication that the identified abnormal traffic pattern is a computer network attack; and
- wherein the control component and the mitigation component are configured to negotiate for permission and receive the diverted traffic based on the identified abnormal traffic pattern.
5. The computing device of claim 1, further comprising:
- an analysis component configured to determine the source by identifying an IP address of the source; and
- the control component is configured to: request for permission to divert network traffic originated from the identified IP address of the source; and receive permission to divert network traffic originated from the identified IP address of the source.
6. A method for mitigating denial of service attacks using a gateway located proximate to a network aggregation point, the method comprising:
- receiving, at the gateway, traffic information, the traffic information including data representing a source, a destination, and an action;
- negotiating for permission to divert network traffic, the negotiating including: sending the data representing the source in the traffic information; and receiving a permission to divert traffic originating from the source; and
- in response to receiving the permission, receiving the diverted traffic originating from the source.
7. The method of claim 6 wherein the data representing the source includes an IP address of the source, and wherein receiving the diverted traffic includes receiving the diverted traffic originating from the IP address.
8. The method of claim 6 wherein:
- the data representing the source includes an IP address of the source; and
- negotiating for permission includes requesting to divert network traffic originated from the identified IP address of the source.
9. The method of claim 6 wherein:
- the data representing the source includes an IP address of the source; and
- negotiating with the network aggregation point includes: requesting to divert network traffic originated from the identified IP address of the source; and receiving permission to divert network traffic originated from the identified IP address of the source.
10. The method of claim 6 wherein:
- the data representing the source includes an IP address of the source; and
- negotiating with the network aggregation point includes: requesting to divert network traffic originated from the identified IP address of the source; receiving permission to divert network traffic originated from the identified IP address of the source; and announcing a network route to the gateway for diverting network traffic from the identified IP address of the source.
11. The method of claim 6, further comprising:
- receiving a traffic rule, the traffic rule identifying an abnormal traffic pattern or an acceptable traffic pattern; and
- monitoring the network traffic originating from the source based on the received traffic rule.
12. The method of claim 6, further comprising:
- receiving a traffic rule, the traffic rule identifying an abnormal or a normal traffic pattern of the network traffic originating from the source;
- monitoring the network traffic based on the received traffic rule; and
- indicating a network traffic alarm when the abnormal traffic pattern is detected or when one of the normal traffic pattern is violated.
13. The method of claim 6, further comprising:
- receiving a traffic rule, the traffic rule identifying an abnormal or an normal traffic pattern of the network traffic originating from the source;
- monitoring the network traffic based on the received traffic rule;
- indicating a network traffic alarm when the abnormal traffic pattern is detected or when the normal traffic pattern is violated; and
- receiving an indication that the network traffic alarm is a false alarm.
14. The method of claim 6, further comprising:
- receiving a traffic rule, the traffic rule identifying an abnormal or an normal traffic pattern of the network traffic originating from the source;
- monitoring the network traffic based on the received traffic rule;
- indicating a network traffic alarm when the abnormal traffic pattern is detected or when the normal traffic pattern is violated;
- receiving an indication that the network traffic alarm is a denial of service attack; and
- in response to receiving the indication, performing the negotiating and receiving operations based on the identified abnormal traffic pattern.
15. The method of claim 6 wherein the network aggregation point includes an internet service provider or an internet exchange point, and wherein the gateway is physically located proximate to the network aggregation point.
16. A method for mitigating computer network attacks, comprising:
- determining, at a mitigation device located approximate to a network aggregation point, a source from which a computer network attack on a computing system originated based on source information related to the computer network attack;
- transmitting, from the mitigation device, a request to the network aggregation point to divert network traffic originating from the source to the mitigation device;
- receiving, at the mitigation device, (i) permission to divert in response to the transmitted request and (ii) diverted network traffic from the network aggregation point, the diverted network traffic being originated from the determined source and destined to the computing system via the network aggregation point; and
- performing, at the mitigation device, at least one of blocking, filtering, or rerouting of the received network traffic from the network aggregation point.
17. The method of claim 16 wherein the source information identifies an IP address of the source related to the computer network attack on the computing system.
18. The method of claim 16 wherein:
- the source information identifies an IP address of the source related to the computer network attack on the computing system; and
- transmitting the request includes transmitting a request to divert network traffic originated from the identified IP address and destined to the computing system via the network aggregation point.
19. The method of claim 16 wherein:
- the source information identifies an IP address of the source related to the computer network attack on the computing system;
- transmitting the request includes transmitting a request to divert network traffic originated from the identified IP address and destined to the computing system via the network aggregation point; and
- receiving permission includes receiving permission from the network aggregation point to divert network traffic originated from the identified IP address to the computing system via the network aggregation point.
20. The method of claim 16 wherein:
- the source information identifies an IP address of the source related to the computer network attack on the computing system;
- transmitting the request includes transmitting a request to divert network traffic originated from the identified IP address and destined to the computing system via the network aggregation point; and
- receiving permission includes receiving permission from the network aggregation point to divert network traffic originated from the identified IP address to the computing system via the network aggregation point; and
- the method further includes in response to receiving the permission, announcing to the network aggregation point a network route to the mitigation device for diverting network traffic from the identified IP address.
Type: Application
Filed: May 28, 2015
Publication Date: Dec 1, 2016
Patent Grant number: 9621577
Inventor: Mehmet Akcin (Bothell, WA)
Application Number: 14/724,749